Filters
total: 25485
filtered: 3333
-
Catalog
- Publications 3333 available results
- Journals 622 available results
- Conferences 242 available results
- Publishing Houses 1 available results
- People 260 available results
- Inventions 1 available results
- Projects 31 available results
- Research Teams 1 available results
- Research Equipment 2 available results
- e-Learning Courses 284 available results
- Events 4 available results
- Open Research Data 20704 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: INFORMATION AND COMMUNICATION TECHNOLOGIES
-
Design of Cost-Efficient Optical Fronthaul for 5G/6G Networks: An Optimization Perspective
PublicationCurrently, 5G and the forthcoming 6G mobile communication systems are the most promising cellular generations expected to beat the growing hunger for bandwidth and enable the fully connected world presented by the Internet of Everything (IoE). The cloud radio access network (CRAN) has been proposed as a promising architecture for meeting the needs and goals of 5G/6G (5G and beyond) networks. Nevertheless, the provisioning of cost-efficient...
-
Are quantum correlations symmetric?
PublicationWe provide operational definition of symmetry of entanglement: An entangled state contains symmetric entanglement if its subsystems can be exchanged (swapped) by means of local operations and classical communication. We show that in general states have asymmetric entanglement. This allows to construct nonsymmetric measure of entanglement, and a parameter that reports asymmetry of entanglement contents of quantum state. We propose...
-
Data Acquisition in a Manoeuver Auto-negotiation System
PublicationTypical approach to collision avoidance systems with artificial intelligence support is that such systems assume a central communication and management point (such as e.g. VTS station), usually located on shore. This approach is, however, not applicable in case of an open water encounter. Thus, recently a new approach towards collision avoidance has been proposed, assuming that all ships in the encounter, either restricted or open...
-
Fashion Games, Fashion in Games and Gamification in Fashion. A First Map
PublicationFashion companies have been using different forms of entertainment such as film and television, sport, music, museums, and photography as inspiration sources and as communication and marketing channels for decades. However, in recent years, they have also started to consider the gaming world. While gaming offers a potential revenue stream from sales of physical and digital clothing, change in it is also the gateway to access new...
-
Analysis of Video Transmission Capabilities in a Simulated OFDM-Based Supplementary BPL-PLC System
PublicationThe design and maintenance of a reliable communication system, especially in harsh working conditions for the oil and mining industry, brings many challenges. With the use of a video transmission system, one can monitor the crew and their working environment. Broadband over power line–power line communication (BPL-PLC) seems an ideal medium for such a service, since it enables the use of the existing wired infrastructure for supplementary...
-
Autistic Employees’ Technology-Based Workplace Accommodation Preferences Survey—Preliminary Findings
PublicationBackground: There has been an increase in the number of research studies focused on the design of accommodations aimed at improving the well-being and work performance of autistic employees. These accommodations took various forms; some of them were based on modification of management practices, for example, support in the area of effective communication, or involved modifications to the physical working environment aimed at limiting...
-
A repeated game formulation of network embedded coding for multicast resilience in extreme conditions
PublicationComputer networks and data sharing applications are vital for our current society and fundamental for any available ICT solution, so that networking is considered as one of the key critical infrastructures and its correct behavior should be always enforced, even in case of disasters or severe execution conditions. Resilience is a strongly demanding nonfunctional requirement for current computer networks, and one of the key factors...
-
What Skills for Multi-Partner Open Innovation Projects? Open Innovation Competence Profile in a Cluster Ecosystem Context
PublicationIndustry 4.0 and the turbulent environment have rendered increasing interest in open inno- vation that extends from the bilateral transmission of expertise to multilateral platform collaborations. Open innovation ventures are seen as intricate collaborations that require the commitment of numer- ous partners during the lifetime of the project. In order to examine the specific competence of open innovation teams, we set the research...
-
Increased Certification of Semi-device Independent Random Numbers using Many Inputs and More Postprocessing
PublicationQuantum communication with systems of dimension larger than two provides advantages in information processing tasks. Examples include higher rates of key distribution and random number generation. The main disadvantage of using such multi-dimensional quantum systems is the increased complexity of the experimental setup. Here, we analyze a not-so-obvious problem: the relation between randomness certification and computational requirements...
-
Providing Differentiated Levels of Service Availability in VANET Communications
PublicationInter-vehicle communications seems to be a promising remedy not only for a number of road-safety issues, but also to improve the efficiency of road traffic, as well as to support the on-board infotainment applications. However, it often encounters disruptions due to high mobility of vehicles causing frequent failures of communication links. In this paper, we utilize the idea of multipath vehicle-to-vehicle routing to provide protection...
-
Adopting collaborative games into Open Kanban
PublicationThe crucial element of any agile project is people. Not surprisingly, principles and values such as "Respect for people", "Communication and Collaboration", "Lead using a team approach", and "Learn and improve continuously" are an integral part of Open Kanban. However, Open Kanban has not provided any tools or techniques to aid the human side of software development. Moreover, as a Lean initiative, it is not as comprehensively...
-
Propagation Loss and Interference Analysis for 5G Systems in the Context of C-ITS System Implementation
PublicationThe article presents the concept of implementing subsequent phases of services for the C-ITS system (the Cooperative Intelligent Transport Systems), based on the European Parliament resolution of March 2018. Next, the 5G systems, in the context of their possible cooperation with C-ITS systems, were discussed. Numerical propagation analysis was performed for V2V and V2I type communication based on two different propagation models....
-
Social media as an opportunity or a blind alley in social communication and forest education? – Experiences from Poland
PublicationThe article characterizes the experiences, problems, and prospects for the development of forest education on social media, which in Poland has been carried out by the Państwowe Gospodarstwo Leśne Lasy Państwowe (National Forest Holding ‘State...
-
Fashion communication research: A way ahead
Publication -
Borders of Digital Art in the Context of the Information Society
PublicationThe article shows the relationship between the development of information technologies, the characteristics of the information society and digital art. The broad possibilities of the digital world related to recording, storing and processing data (cyber text, big data, smart services) and the creation of virtual worlds are pointed out. The influence of the development of information technologies on the character of the works of...
-
Blockchain technologies to address smart city and society challenges
PublicationNew Information and Communications Technologies (ICT) are changing the way in which the world works. These technologies provide new tools to face the issues of contemporary society (poverty, migrations, sustainable development challenges, governance, etc.). Among them, blockchain emerge as a disruptive technology able to make things in a completely different and innovative way. They can provide solutions where before there were...
-
Evaluation of multimedia applications in a cluster oriented environment
PublicationIn the age of Information and Communication Technology (ICT), Web and the Internet have changed significantly the way applications are developed, deployed and used. One of recent trends is modern design of web-applications based on SOA. This process is based on the composition of existing web services into a single scenario from the point of view of a particular user or client. This allows IT companies to shorten product time-to-market....
-
The evaluation of eGlasses eye tracking module as an extension for Scratch
PublicationIn this paper we present the possibility of using eGlasses eye tracking module as an extension for Scratch programming tool which is a visual programming language supporting computer skills learning. The main concept behind this project is to setup the interface for rapid interaction design. Eye tracking is a powerful tool for hands free communication but for that requires a dedicated software. This software is rarely tailored...
-
Laboratory Load Model Based on 150 kVA Power Frequency Converter and Simulink Real-Time – Concept, mplementation, Experiments
PublicationFirst section of the paper provides technical specification of laboratory load model basing on 150 kVA power frequency converter and Simulink Real-Time platform. Assumptions, as well as control algorithm structure is presented. Theoretical considerations based on criteria which load types may be simulated using discussed laboratory setup, are described. As described model contains transformer with thyristor-controlled tap changer,...
-
Interactive Prototypes in Teaching User-Centred Design and Business Process Modelling
PublicationThis publication describes experiences gathered during the use of interactive prototyping in two areas: design of user interfaces for a touch screen information kiosk and interactive prototyping of business processes. Prototyping is promoted here as a technique useful for both visualizing design concepts and for stimulating communication within relevant teams. Developing interactive prototypes of use interfaces is discussed here...
-
Rule-Based Model for Selecting Integration Technologies for Smart Cities Systems
PublicationThe aim of this article is to present the stages of development for an information technology integration model for the design of systems for smart cities. The Introduction explains the need for integration technologies and presents a model for selecting integration technologies and the conditions for its use in designing smart cities systems. Then two verification stages of the presented model are discussed. In the first stage,...
-
Potential applicability of ontologies for the evaluation of information technology
PublicationIn this article we present the possibilities of using ontologies as a part of a multi-agent system (MAS) designed for the evaluation of information technologies. This is a part of a broader idea devel-oped by the team of researchers at Gdańsk University of Technology. The article deals with defining ontologies, presenting main technologies for their design and implementation and proposes, initially, domains of the ontologies' interest...
-
MERPSYS: An environment for simulation of parallel application execution on large scale HPC systems
PublicationIn this paper we present a new environment called MERPSYS that allows simulation of parallel application execution time on cluster-based systems. The environment offers a modeling application using the Java language extended with methods representing message passing type communication routines. It also offers a graphical interface for building a system model that incorporates various hardware components such as CPUs, GPUs, interconnects...
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Hybrid storage management system consisting of supercapacitors and AHI batteries
PublicationIn the article the hybrid storage, composed of Aqueous Hybrid Ion battery and supercapacitor was presented. The system was tested through simulation studies. The work also describes the construction and properties of the developed device meant to control the energy flow of the storage and a communication system for remote parameter supervision.
-
Parallelization of Selected Algorithms on Multi-core CPUs, a Cluster and in a Hybrid CPU+Xeon Phi Environment
PublicationIn the paper we present parallel implementations as well as execution times and speed-ups of three different algorithms run in various environments such as on a workstation with multi-core CPUs and a cluster. The parallel codes, implementing the master-slave model in C+MPI, differ in computation to communication ratios. The considered problems include: a genetic algorithm with various ratios of master processing time to communication...
-
Performance of the Direct Sequence Spread Spectrum Underwater Acoustic Communication System with Differential Detection in Strong Multipath Propagation Conditions
PublicationThe underwater acoustic communication (UAC) operating in very shallow-water should ensure reliable transmission in conditions of strong multipath propagation, significantly disturbing the received signal. One of the techniques to achieve this goal is the direct sequence spread spectrum (DSSS) technique, which consists in binary phase shift keying (BPSK) according to a pseudo-random spreading sequence. This paper describes the DSSS...
-
Wykorzystanie mediów społecznościowych do promocji otwartości w badaniach naukowych na przykładzie Biblioteki Politechniki Gdańskiej
PublicationMedia społecznościowe są jednym ze sposobów na skuteczną promocję zasobów oraz usług bibliotecznych w obecnym świecie cyfrowym. Stanowią również niedocenianą możliwość komunikacji pomiędzy naukowcami, bibliotekarzami a czytelnikami. Biblioteka akademicka może aktywnie angażować się w proces upowszechniania dorobku naukowego uczelni, podejmując w tym celu różnorakie działania marketingowe, wykorzystując takie serwisy jak: Facebook,...
-
INTEGRATION OF THE MOBILE PLATFORMS BASED ON SOCIAL NETWORK SERVICE DIRECTED AT USERS LOCALIZATION
PublicationThis paper presents an architecture overview and some aspects of implementation of the social network service directed at users localization. It shows how web services can be used as a tool for integrating different mobile platforms with a web application. The main focus is set on communication between system elements and related problems.
-
Synchronous black hole search in directed graphs
PublicationThe paper considers a team of robots which has to explore a graph G, where some nodes can be harmful. Robots are initially located at the so-called home base node. The dangerous nodes are the so-called black hole nodes, and once a robot enters in one of them, it is destroyed. The goal is to find a strategy in order to explore G in such a way that minimum number of robots is wasted. The exploration ends if there is at least one...
-
Optymalizacja zasobów chmury obliczeniowej z wykorzystaniem inteligentnych agentów w zdalnym nauczaniu
PublicationRozprawa dotyczy optymalizacji zasobów chmury obliczeniowej, w której zastosowano inteligentne agenty w zdalnym nauczaniu. Zagadnienie jest istotne w edukacji, gdzie wykorzystuje się nowoczesne technologie, takie jak Internet Rzeczy, rozszerzoną i wirtualną rzeczywistość oraz deep learning w środowisku chmury obliczeniowej. Zagadnienie jest istotne również w sytuacji, gdy pandemia wymusza stosowanie zdalnego nauczania na dużą skalę...
-
Distributed representation of information on cyclic events
PublicationA representation of information on cyclic events has been proposed which is advantageous for computing environments where a distributed set of Receivers reacts to cyclic events generated by distributed sources. In such scenario no immanent central information repository exist on event timing or volume. Receivers are able to learn the event cycles without communicating with each other, merely on the basis of the fact that an event...
-
Novel Tools as New Challenges to HRM Communicational Practices (and the Increasingly Important Social Role of the Manager)
PublicationEach communicational process consists inseparably of three aspects: the linguistic (which means the whole language content of the message), technical (which states the form of the message) and the social (meaning social relations, emotions, behaviours). The recent COVID-19 pandemic deeply influenced several layers of our lives. But the main aim of this chapter is to focus on the communicational processes that normally take place...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
New RFID readers for scalable RFID system
PublicationRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
Compact Dual-Polarized Corrugated Horn Antenna for Satellite Communications
PublicationIn this paper, a structure and design procedure of a novel compact dual-polarized corrugated horn antenna with high gain and a stable phase center for satellite communication is presented. The antenna incorporates an Ortho-Mode Transducer (OMT), a mode converter, and a corrugated structure. The compact OMT section is designed to be fed by standard WR-75 waveguides. The proposed compact design utilizes only ten corrugated slots...
-
Digital technologies and women's empowerment – casting the bridges
PublicationThis work briefly discusses the nexuses between digital technology development and adoption across societies, and its potential impact on overall welfare through women’s economic empowerment. In the first section it sets out the context and background. Next, Section 2 demonstrates the state of access to and the use of digital technologies across the world. Section 3 intends to trace the causal links and channels of digital technologies'...
-
The methods of secure data transmission in the KNX system
PublicationThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Multipath Complex Root Tracing
PublicationThe problem of multipath root tracing is being addressed in this communication. The self-adaptive complex root tracing algorithm, which was previously utilized for the investigation of various propagation and radiation problems, is analyzed here for the cases when the traced characteristic bifurcates. A procedure of multiroute detection is proposed and demonstrated on the coaxially loaded cylindrical waveguide example.
-
Quantum randomness protected against detection loophole attacks
PublicationDevice and semi-device-independent private quantum randomness generators are crucial for applications requiring private randomness. However, they are vulnerable to detection inefficiency attacks and this limits severely their usage for practical purposes. Here, we present a method for protecting semi-device-independent private quantum randomness generators in prepare-and-measure scenarios against detection inefficiency attacks....
-
MEASUREMENT AND ANALYSIS OF ELECTRIC FIELD INTENSITY NEAR SELECTED TRANSMITTERS OF MOBILE TELEPHONY BASE STATIONS
PublicationWireless connectivity has become increasingly common in recent times. Day by day, there are more radiocommunication devices and new ideas for them. In the near future, when the fifth generation networks will be implemented, whose main feature will be continuous wireless communication, we must approach the issue of electric field measurements more and more carefully.
-
Application of Smart IoT Technology in Project Management Scenarios
PublicationThe report presents a low-cost and flexible solution to control and monitor home and industrial appliances. The popularity of automation devices has increased greatly in recent years due to higher affordability and simplicity through IoT phone and tablet connectivity. For this purpose, we have developed the IoT Outlet: a stand-alone communication unit, used to connect outlets to the internet. The IoT Plug is a power switch which...
-
Informal Settlements and International Migrants: The city of Rome (Italy) as Case Study
PublicationToday, urbanization is happening at an unprecedentedly rapid rate, owing heavily to the influx of migrants. Empirical evidence shows the development of informal settlements in cities as a result of migration, including Rome. Furthermore, information on informal settlements is either insufficient or inadequate, which makes it challenging for architects, urban planners, and policymakers to form viable solutions to deal with the situations...
-
Collision‐Aware Routing Using Multi‐Objective Seagull Optimization Algorithm for WSN‐Based IoT
PublicationIn recent trends, wireless sensor networks (WSNs) have become popular because of their cost, simple structure, reliability, and developments in the communication field. The Internet of Things (IoT) refers to the interconnection of everyday objects and sharing of information through the Internet. Congestion in networks leads to transmission delays and packet loss and causes wastage of time and energy on recovery. The routing protocols...
-
COMPARISON OF SYSTEM ON CHIP TECHNOLOGIES FOR SPACE APPLICATIONS
PublicationThe paper presents a review of technologies available for the implementation of digital and mixed signal systems, particularly the system on a chip (SoC) for space applications. The phenomena encountered in the space environment are briefly presented, together with the known solutions, regarding the design of complex electronic systems. The most important norms regarding single die integrated circuits designed for space are also...
-
DATABASE AND BIGDATA PROCESSING SYSTEM FOR ANALYSIS OF AIS MESSAGES IN THE NETBALTIC RESEARCH PROJECT
PublicationA specialized database and a software tool for graphical and numerical presentation of maritime measurement results has been designed and implemented as part of the research conducted under the netBaltic project (Internet over the Baltic Sea – the implementation of a multi-system, self-organizing broadband communications network over the sea for enhancing navigation safety through the development of e-navigation services.) The...
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena
PublicationW niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...
-
Concept of Compatibility Region for the Evaluation of IR UWB Electromagnetic Compatibility
PublicationThis paper presents a new proposal for the unified evaluation of ultra wideband and narrowband radio communication systems electromagnetic compatibility, called “compatibility region”. The idea of compatibility region is based on the relation between the ratio of narrowband to ultra wideband signal power in a receiver and some transmission quality indicators (bit error rate, effective data rate).
-
Possibilities of applying standard tools of promotion in place marketing
PublicationThe purpose of this article is to present the tools of promotion that can be used by local government units in the developing and implementing of marketing strategies. The article evaluates a set of four basic tools of promotion comprising advertising, public relations and publicity, sales promotion and personal selling. This group was supplemented by direct marketing, presented from the point of view of communication via the Internet.
-
Distributed infrastructure of self-organizing service servers
PublicationThis paper presents an idea of creating distributed system consisting of autonomous self-organizing service providers. It shows a real implemented system allowing for dynamic service search without interaction with client based on the inter-servers communication. Moreover presented system can be easily enriched with new elements without the need for restarting already existing servers.